Journal of Information Assurance & Cybersecurity
Latest Publications


TOTAL DOCUMENTS

20
(FIVE YEARS 6)

H-INDEX

3
(FIVE YEARS 0)

Published By Ibima Publishing

2165-9923, 2165-9923

Author(s):  
Dan-Alex Ceaușescu-Constantinescu ◽  
Andreea-Alexandra Chiriac (Roșca) ◽  
Claudiu Chiriac

Data is probably the most valuable resource of our time, similar to what represented oil a century ago. Technology giants built their competitive advantage on the huge amount of data they are dealing with to drive the biggest societal changes. The disputes on data created the premises for a new industry to emerge – cybercrime.


Author(s):  
Haitham ASSIRI ◽  
Priyadarsi NANDA ◽  
Manoranjan MOHANTY

The e-Government system leverages Information and Communication Technology (ICT) to transform the relationship between government bodies and citizens, businesses and other government ministries, departments, and agencies. The primary aim is to make government services more seamless, efficient and timely for every citizen and organisation. However, e-Government systems are now faced with security threats and cyber attacks, and these challenges have raised concerns about users’ privacy as well as the confidentiality and integrity of user data.


Author(s):  
Dian Damayanti

Crimes of terrorism are not only done through the internet, but can also be done through networks that can send signals such as telephone communications. By implementing a cyber terrorism policy at the police, terrorism cases will decrease every year. The implementation of this policy helps to overcome the problem of terrorism in Indonesia.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Mohammed Alqahtani ◽  
Robin Braun

Evidence suggests that, regardless of the number of technical controls in place, organizations will still experience security breaches. Organizations spend millions of dollars on their cyber security infrastructure that includes technical and non-technical measures but mostly disregarded the most important asset and vulnerability the human.


Author(s):  
André Gomes ◽  
Carla Santos ◽  
Cristina Wanzeller ◽  
Pedro Martins

In an increasingly digital world, information security is a very recurring theme and a growing concern for companies. This involves the protection of data and confidential or non-confidential information of a company, which transit between all its sectors and between the organization and its stakeholders.


Author(s):  
Olga Dziegielewska

A couple of years ago, along with raising popularity of smart devices that promote voice authentication mechanisms, voice recognition became a buzz topic again. Not only voice patterns recognition algorithms significantly improved their quality, but also with a rapid growth in the development of sound editing tools and an outburst of the deep-fake concepts, the attack surface of voice authenticators significantly expanded.


Author(s):  
Elena-Adriana MINASTIREANU ◽  
Gabriela MESNITA

In the current web advertising activities, the fraud increases the number of risks for online marketing, advertising industry and e-business. The click fraud is considered one of the most critical issues in online advertising. Even if the online advertisers make permanent efforts to improve the traffic filtering techniques, they are still looking for the best protection methods to detect click frauds.


Sign in / Sign up

Export Citation Format

Share Document