data theft
Recently Published Documents


TOTAL DOCUMENTS

105
(FIVE YEARS 45)

H-INDEX

6
(FIVE YEARS 1)

SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 100-110
Author(s):  
Ahmad Arif ◽  
Adidtya Perdana ◽  
Arief Budiman

Data security is most important today, because the rampant data theft resulting in a lot of misuse of data by irresponsible parties so that it makes us anxious as data owners, for data storage it is usually stored in the database. From these problems the idea emerged to create a cryptographic system where the system can secure data by encrypting and decrypting also make data fully save and then the data owned by the user. This study aims to secure the data in the database by encrypting the original data without destroying the original data when later after decrypted. To perform this security, a cryptographic methodology is used with both of  method that is Vigenere Cipher and Triangle Chain Cipher algorithms which are implemented in the application because both of methodology have same root that is classical cryptographic. This application will later be used as a medium for users to secure their data in the database so that later data theft will not to be easy. After doing fully research that produces applications that can implement combination of Vigenere Cipher and Triangle Chain Cipher algorithms,data in the encrypted database field is safe because encryption has been done to the data.


Author(s):  
Pratik Narendra Gulhane ◽  
Yash Vishwas Manwar

Cyber Security is a process that’s designed to protect networks and devices from external threats. It is important because it protects all categories of data from theft and damage. This paper addresses Cyber Security, Need of Cyber security and its Measures. In today’s world we found that the amount of threats like data theft, scams, and phishing are increasing day-by-day. So this explains how the cyber security is important while dealing with internet. It can be prevented by following the security measures. To overcome the barriers related to security issues we have to spread awareness about cyber security and its measures. Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats of it are hard to deny, there is no perfect solution for cybercrimes but we should try our best to minimize them.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Kenneth S. Abraham ◽  
George E. White

Abstract The future of tort theory cannot be sensibly imagined without understanding its past. Our aim is to understand where tort theory has been in order to predict where it may go. We contend that tort theory has experienced two different eras, and that it may well be about to enter a third. In the first era, spanning roughly the first three-quarters of the twentieth century, tort theory faced outward to the world, focusing on issues affecting redress for civil injuries that were being decided in the courts and emerging in American society at large. In the second era, roughly the last 30 to 40 years, tort theory turned inward and focused mostly on itself. The tort theory that has been done during this second era, valuable though it has been, may well have borne most of its scholarly fruit. We may therefore be ready to move into a third era, in which tort theory turns outward again and becomes occupied with the cutting-edge issues of tort law policy and principle that will be generated as the twenty-first century progresses. This Essay chronicles the first era, in which tort theory faced outward, the second era, in which tort theory turned inward, and identifies three issues that we believe may be on the tort theory agenda, when and if tort theory turns outward again. These involve the coordination and systematization of tort with other sources of regulation and compensation; redressing data theft and digital invasions of privacy; and heightened sensitivity to harm associated with sex, gender, and race-related misconduct.


2021 ◽  
Vol 42 (1) ◽  
pp. 19
Author(s):  
Taufik Hidayat ◽  
Rahutomo Mahardiko

Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, and other algorithms. This research proposed a review in AES algorithm for data encryption within blockchain technology. The research process is followed by determining library, then creating relevant questions and criteria. For good opportunity in the future, this paper generated suggestions and opportunities so that better research can be established in data encryption.


Author(s):  
Debasis Neogi

The present paper has proposed a model to show that a synergy of technology and legal procedure can work as deterrent to cybercrime. The fraudulent activities the model considers are of two types. The first one is the case when the processed information gets diverted to reach someone else rather than reaching its targeted destination, thereby creating an incidence of data theft and hacking. The second one is a case of already hacked situation. The model has established that in the present-day context, synergic efforts of technology and legal provisioning can emerge as an effective option to ensure cyber security to some significant extent. The application of the proposed model in practical field is also illustrated with the analysis of a case of cybercrime.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Abir Al-Harrasi ◽  
Abdul Khalique Shaikh ◽  
Ali Al-Badi

Purpose One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage. Design/methodology/approach The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases. Findings The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats. Originality/value The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.


Author(s):  
Koleayo Omoyajowo ◽  
Susan Ebosiem ◽  
Adeyemi Akinola ◽  
Sunday Amiolemen ◽  
Kolawole Omoyajowo ◽  
...  

This study evaluates factors influencing the adoption of telecommuting among the selected organisations in Nigeria. A questionnaire research tool was used basically to capture the level of awareness, interest, readiness, and perception of Nigerian organisations towards telecommuting. A total of 180 questionnaires was administered to 180 Nigerian firms in Lagos, 120 questionnaires were counted valid for analysis. This study observed high level of awareness among Nigerian organisations but paradoxically, this high level of awareness does not engender the adoption of telecommuting by those organisations. Findings revealed that the fright of difficulty in assessing employees’ performance, inadequacy of ICT infrastructures and the fear of corporate data theft are the key factors inhibiting the adoption of telecommuting by organisations. This study concluded there is a need for organisations to be aware of the benefits of telecommuting and how telecommuting policy can be devised to strategically fit into the work culture for productivity. Keywords: Telecommuting; Public Research Institutes, Adoption, Factors, Lagos.


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


Sign in / Sign up

Export Citation Format

Share Document